Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 16:58
Behavioral task
behavioral1
Sample
b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe
Resource
win10v2004-20220812-en
General
-
Target
b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe
-
Size
282KB
-
MD5
054ad5b07f6eb862bf1ac051588ee130
-
SHA1
12e4f42623cb38bdb14d5c304b81ce8506972d14
-
SHA256
b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879
-
SHA512
c3e34a716774f7c030089c46db64787abe84df5190d8e736a286ec50cd8cd71195a1d916e47152afebb0c6891dfbd69cf91a8e70628d89e8badb3be277f7520f
-
SSDEEP
6144:4YZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0ew+/UO7BK:4SNC80I+cR3R03VseuOtK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe chrome.exe" b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/696-55-0x0000000000400000-0x00000000004AF000-memory.dmp upx behavioral1/memory/696-62-0x0000000000400000-0x00000000004AF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\chrome.exe" b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\q: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\r: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\t: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\a: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\e: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\i: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\l: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\o: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\v: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\w: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\b: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\j: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\n: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\s: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\k: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\m: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\p: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\x: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\y: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\f: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\g: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\h: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\u: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened (read-only) \??\z: b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/696-62-0x0000000000400000-0x00000000004AF000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\d:\autorun.inf b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\chrome.exe b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened for modification C:\Windows\SysWOW64\autorun.ini b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File created C:\Windows\SysWOW64\chrome.exe b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\chrome.exe b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe File opened for modification C:\Windows\chrome.exe b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://h1.ripway.com/poojasharma/index.html" b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://h1.ripway.com/poojasharma/index.html" b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://h1.ripway.com/poojasharma/index.html" b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://h1.ripway.com/poojasharma/index.html" b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://h1.ripway.com/poojasharma/index.html" b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 696 wrote to memory of 1980 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 28 PID 696 wrote to memory of 1980 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 28 PID 696 wrote to memory of 1980 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 28 PID 696 wrote to memory of 1980 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 28 PID 1980 wrote to memory of 1548 1980 cmd.exe 30 PID 1980 wrote to memory of 1548 1980 cmd.exe 30 PID 1980 wrote to memory of 1548 1980 cmd.exe 30 PID 1980 wrote to memory of 1548 1980 cmd.exe 30 PID 696 wrote to memory of 1396 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 31 PID 696 wrote to memory of 1396 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 31 PID 696 wrote to memory of 1396 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 31 PID 696 wrote to memory of 1396 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 31 PID 1396 wrote to memory of 1312 1396 cmd.exe 33 PID 1396 wrote to memory of 1312 1396 cmd.exe 33 PID 1396 wrote to memory of 1312 1396 cmd.exe 33 PID 1396 wrote to memory of 1312 1396 cmd.exe 33 PID 696 wrote to memory of 864 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 36 PID 696 wrote to memory of 864 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 36 PID 696 wrote to memory of 864 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 36 PID 696 wrote to memory of 864 696 b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe 36 PID 864 wrote to memory of 1512 864 cmd.exe 38 PID 864 wrote to memory of 1512 864 cmd.exe 38 PID 864 wrote to memory of 1512 864 cmd.exe 38 PID 864 wrote to memory of 1512 864 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe"C:\Users\Admin\AppData\Local\Temp\b344b36a1a0287f0dc75e11d1f2dfc8438ce6c0937b6b53d0fb2fe41d5ba7879.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\chrome.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\chrome.exe3⤵PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\cacls.execacls "C:\system volume information" /e /g "Admin":f3⤵PID:1512
-
-